US8844023B2 - Password protected built-in test mode for memories - Google Patents
Password protected built-in test mode for memories Download PDFInfo
- Publication number
- US8844023B2 US8844023B2 US12/326,165 US32616508A US8844023B2 US 8844023 B2 US8844023 B2 US 8844023B2 US 32616508 A US32616508 A US 32616508A US 8844023 B2 US8844023 B2 US 8844023B2
- Authority
- US
- United States
- Prior art keywords
- test mode
- password
- memory
- built
- random number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
- G06F12/1425—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
- G06F12/1433—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block for a module or a part of a module
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C29/46—Test trigger logic
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C7/00—Arrangements for writing information into, or reading information out from, a digital store
- G11C7/24—Memory cell safety or protection circuits, e.g. arrangements for preventing inadvertent reading or writing; Status cells; Test cells
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
Definitions
- This relates to semiconductor memories.
- Semiconductor memories such as flash memories, may include a built-in test mode.
- the built-in test mode may be utilized by the manufacturer to conduct tests prior to distribution of the product.
- the built-in test mode may also be utilized subsequently, upon return of the part to the manufacturer, to analyze product failures.
- the built-in test mode may be implemented by writing parameters to a test mode decoder to facilitate certain operative tests. These tests are generally run in what is called an engineering work station which has a receptacle for receiving the memories under test and for applying test parameters to those memories. The engineering work station also collects the results of the tests and provides the analysis of the results in order to determine whether the parts are operating correctly.
- FIG. 1 is a schematic depiction of one embodiment of the present invention
- FIG. 2 is a test set up according to one embodiment
- FIG. 3 is a flow chart for a set up flow in accordance with one embodiment of the present invention.
- FIG. 4 is a flow chart for a built-in test mode in accordance with one embodiment of the present invention.
- a built-in test mode may be accessed after manufacture only through a password protected scheme. Basically, after manufacturing and delivery of the memory to the customer, the customer may program a password into the memory. That password controls access to the built-in test mode thereafter.
- the manufacturer can only access the built-in test mode if the manufacturer receives, from the customer, the password needed to access the built-in test mode.
- the customer upon purchasing the device, the customer can write a password which controls built-in test mode access thereafter.
- the manufacturer and all other users of the memory would have no idea what the password is and, therefore, could not access the built-in test mode.
- Embodiments may be utilized in a variety of semiconductor memories including volatile and non-volatile memories.
- semiconductor memories including volatile and non-volatile memories.
- EEPROMs electrically erasable programmable read-only memories
- flash memories including both NOR and NAND flash
- phase change memories including both NOR and NAND flash
- dynamic random access memories including both NOR and NAND flash
- static random access memories may be used, to mention a few examples.
- an integrated semiconductor memory 10 may include a memory controller 12 coupled to a memory array 16 .
- the memory array 16 may include rows and columns of cells that may be addressed in a variety of different fashions to either program information into the cell or to access information already programmed in the cell.
- the memory array 16 may be accessed by a memory controller 12 which, in some embodiments, may be part of an integrated semiconductor memory 10 .
- the memory controller 12 may also be accessed by test mode decoder 14 .
- the test mode decoder 14 or test mode interface allows access to built-in test modes controlled by the memory controller 12 . Alternatively, the test mode may be entered by forcing an internal signal to change from the normal operating mode.
- a configuration memory 17 that may be external to the array 16 , may store information about the configuration of the memory 10 .
- the memory 17 may be a non-volatile memory.
- a random number generator 19 may generate a random number used by the customer to encrypt a password.
- the configuration memory 17 may be programmed also with a special key, such as a double word password.
- a special key such as a double word password.
- the password programming can be checked by the device at power on to be sure that the device is correctly configured, that the password was written, and the test mode access configuration is also valid. This check may be necessary because after the integrated circuit is fabricated, the manufacturer cannot know the configuration of the device that might possibly be test mode password protected with an unknown password. If a complicated and longer key is also stored in a special part of the configuration memory 17 , the probability of having a non-accessible device is very low.
- the users of the memory 10 may access the built-in test mode by writing to registers of the configuration memory 17 (also called a POR sector).
- the configuration memory 17 stores configuration information for the memory.
- the configuration memory 17 may also store the information needed to access the built-in test mode after the password has been programmed.
- the test mode decoder 14 may, in some embodiments, also store a test mode sequence 24 that implements the test mode and a test mode set up sequence 18 .
- the sequences 18 and 24 may be software executed by a processor-based system such as the controller 12 or the decoder 14 . Alternatively, the sequences may be implemented in hardware or firmware.
- the memory 10 may be coupled to a test apparatus 46 that applies test signals to the memory 10 under test (MUT), as shown in FIG. 2 .
- the test apparatus 46 is coupled to a test processor 44 that includes storage 42 .
- User access to the test processor 44 is gained through the engineering work station (EWS) 40 using an EWS flow to configure and test the memory from the fab.
- EWS engineering work station
- the various parameters to set up the configuration of the memory 10 may be programmed, as indicated in block 20 in FIG. 3 .
- password protection may be enabled, for example, by writing a double word to the configuration memory 17 .
- a flag is set that thereafter results in the requirement for the provision of a password to use the test mode.
- subsequent accesses to the test mode require provision of a password.
- a check at diamond 26 in FIG. 4 determines whether the flag has been set and the device is password enabled. If not, the flow continues normally. Otherwise, a check determines whether the correct password was entered, as indicated in block 28 . In other words, the user password must be provided in order to access the test mode. If the password is not provided, no further progress of the flow may be allowed in some embodiments. If the password that is provided checks out when compared to the password stored in the configuration memory 17 , then test mode access is allowed.
- the various parameters to implement the test mode may then be received, as indicated in block 30 . These parameters provide the tests that will be implemented and the data that is necessary to implement the tests, as is conventional in built-in test mode sequences.
- the memory 10 is thereafter no longer password protected. In other words, once the password is received, the password protection feature is effectively disabled.
- a more elaborate encryption technique may be utilized. Basically, a random number may be used to further encrypt the password.
- a function may be defined that sets an encrypted code. The encrypted code is a function of a random number generated by the memory and the password established by the customer.
- the manufacturer obtains the random number from a random number generator on board the memory.
- the manufacturer then sends the random number to the customer.
- the customer forwards a password encypted with the random number.
- the manufacturer can then access to the test mode of the device using the encoded password.
- the manufacturer may, in some embodiments, reset the test mode protection and may not need the password thereafter.
- the customer may grant the manufacturer access to the test mode by giving a password to the manufacturer.
- the manufacturer in some cases, may have to calculate an unlock key, which is a function of the password in a random number. In this way, the customer may keep the password secret by only giving the encrypted password.
- the customer may use a random number generated by the device to encrypt the password. Where the password is different from device-to-device, it may not matter that the manufacturer gains access to the password and, therefore, the simpler technique may be utilized.
- references throughout this specification to “one embodiment” or “an embodiment” mean that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one implementation encompassed within the present invention. Thus, appearances of the phrase “one embodiment” or “in an embodiment” are not necessarily referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be instituted in other suitable forms other than the particular embodiment illustrated and all such forms may be encompassed within the claims of the present application.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Mathematical Physics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/326,165 US8844023B2 (en) | 2008-12-02 | 2008-12-02 | Password protected built-in test mode for memories |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/326,165 US8844023B2 (en) | 2008-12-02 | 2008-12-02 | Password protected built-in test mode for memories |
Publications (2)
Publication Number | Publication Date |
---|---|
US20100138915A1 US20100138915A1 (en) | 2010-06-03 |
US8844023B2 true US8844023B2 (en) | 2014-09-23 |
Family
ID=42223984
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/326,165 Active 2030-11-15 US8844023B2 (en) | 2008-12-02 | 2008-12-02 | Password protected built-in test mode for memories |
Country Status (1)
Country | Link |
---|---|
US (1) | US8844023B2 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105843112B (en) * | 2016-03-15 | 2018-07-13 | 珠海格力电器股份有限公司 | MCU, terminal and control method |
Citations (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4310720A (en) * | 1978-03-31 | 1982-01-12 | Pitney Bowes Inc. | Computer accessing system |
US4882752A (en) * | 1986-06-25 | 1989-11-21 | Lindman Richard S | Computer security system |
US5210571A (en) * | 1991-09-26 | 1993-05-11 | Xerox Corporation | System for servicing electronic printers and printing systems |
US5388156A (en) * | 1992-02-26 | 1995-02-07 | International Business Machines Corp. | Personal computer system with security features and method |
US5506396A (en) * | 1993-02-09 | 1996-04-09 | Mitsubishi Denki Kabushiki Kaisha | Microcomputer for IC card |
US5719387A (en) * | 1995-03-29 | 1998-02-17 | Mitsubishi Denki Kabushiki Kaisha | IC card including a memory, a password collating means and an access permitting means for permitting access to the memory |
US6085337A (en) * | 1998-09-21 | 2000-07-04 | Infineon Technologies North America Corp. | Method and system for reliably indicating test results during a self-check operation |
US6094724A (en) * | 1997-11-26 | 2000-07-25 | Atmel Corporation | Secure memory having anti-wire tapping |
US6401198B1 (en) * | 1999-03-09 | 2002-06-04 | Texas Instruments Incorporated | Storing system-level mass storage configuration data in non-volatile memory on each mass storage device to allow for reboot/power-on reconfiguration of all installed mass storage devices to the same configuration as last use |
US20030018939A1 (en) * | 2001-07-19 | 2003-01-23 | Mitsubishi Denki Kabushiki Kaisha | Test circuit capable of testing embedded memory with reliability |
US20030084307A1 (en) * | 2001-10-30 | 2003-05-01 | Schwartz Jeffrey D. | Secure boot device selection method and system |
US6681304B1 (en) * | 2000-06-30 | 2004-01-20 | Intel Corporation | Method and device for providing hidden storage in non-volatile memory |
US20040025027A1 (en) * | 2002-07-30 | 2004-02-05 | Eric Balard | Secure protection method for access to protected resources in a processor |
US20040071028A1 (en) * | 2002-05-31 | 2004-04-15 | Stmicroelectronics S.R.L. | Testing method and device for non-volatile memories having a LPC (low pin count) communication serial interface |
US6731536B1 (en) * | 2001-03-05 | 2004-05-04 | Advanced Micro Devices, Inc. | Password and dynamic protection of flash memory data |
US20050044222A1 (en) * | 2003-06-26 | 2005-02-24 | Kazuma Sekiya | Method of exchanging test processing information |
US6892322B1 (en) * | 2000-10-26 | 2005-05-10 | Cypress Semiconductor Corporation | Method for applying instructions to microprocessor in test mode |
US20050229065A1 (en) * | 2004-04-01 | 2005-10-13 | Yasukazu Kai | Semiconductor integrated ciruit which properly executes an operational test of a circuit under test in the semiconductor integrated circuit |
US20060059398A1 (en) * | 2004-09-10 | 2006-03-16 | Chang Young-Uk | Generation of test mode signals in memory device with minimized wiring |
US20060161725A1 (en) * | 2005-01-20 | 2006-07-20 | Lee Charles C | Multiple function flash memory system |
US7099906B2 (en) * | 2001-10-12 | 2006-08-29 | Stmicroelectronics, S.R.L. | Random bit sequence generator |
US20060282734A1 (en) * | 2005-05-23 | 2006-12-14 | Arm Limited | Test access control for secure integrated circuits |
US20070192828A1 (en) * | 2005-01-19 | 2007-08-16 | Stmicroelectronics S.R.L. | Enhanced security memory access method and architecture |
US20080147964A1 (en) * | 2004-02-26 | 2008-06-19 | Chow David Q | Using various flash memory cells to build usb data flash cards with multiple partitions and autorun function |
US7395434B2 (en) * | 2002-05-01 | 2008-07-01 | Hewlett-Packard Development Company, L.P. | Method for secure storage and verification of the administrator, power-on password and configuration information |
US7441169B2 (en) * | 2002-12-16 | 2008-10-21 | Renesas Technology Corp. | Semiconductor integrated circuit with test circuit |
US7519873B2 (en) * | 2004-06-11 | 2009-04-14 | Samsung Electronics Co., Ltd. | Methods and apparatus for interfacing between test system and memory |
US20090125683A1 (en) * | 2005-11-07 | 2009-05-14 | Satoshi Okamoto | Portable auxiliary storage device |
US20090307502A1 (en) * | 2008-06-04 | 2009-12-10 | Ati Technologies Ulc | Method and apparatus for securing digital information on an integrated circuit read only memory during test operating modes |
US20090307411A1 (en) * | 2008-06-04 | 2009-12-10 | Ati Technologies Ulc | Method and apparatus for securing digital information on an integrated circuit during test operating modes |
US20100043078A1 (en) * | 2004-02-23 | 2010-02-18 | Lexar Media, Inc. | Secure compact flash |
US7702984B1 (en) * | 2000-01-06 | 2010-04-20 | Super Talent Electronics, Inc. | High volume testing for USB electronic data flash cards |
US7730368B2 (en) * | 2003-10-31 | 2010-06-01 | Sandisk Il Ltd. | Method, system and computer-readable code for testing of flash memory |
US7788553B2 (en) * | 2000-01-06 | 2010-08-31 | Super Talent Electronics, Inc. | Mass production testing of USB flash cards with various flash memory cells |
US7873837B1 (en) * | 2000-01-06 | 2011-01-18 | Super Talent Electronics, Inc. | Data security for electronic data flash card |
US20110068907A1 (en) * | 2005-04-25 | 2011-03-24 | Seung Hyup Ryoo | Reader control system |
-
2008
- 2008-12-02 US US12/326,165 patent/US8844023B2/en active Active
Patent Citations (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4310720A (en) * | 1978-03-31 | 1982-01-12 | Pitney Bowes Inc. | Computer accessing system |
US4882752A (en) * | 1986-06-25 | 1989-11-21 | Lindman Richard S | Computer security system |
US5210571A (en) * | 1991-09-26 | 1993-05-11 | Xerox Corporation | System for servicing electronic printers and printing systems |
US5388156A (en) * | 1992-02-26 | 1995-02-07 | International Business Machines Corp. | Personal computer system with security features and method |
US5506396A (en) * | 1993-02-09 | 1996-04-09 | Mitsubishi Denki Kabushiki Kaisha | Microcomputer for IC card |
US5719387A (en) * | 1995-03-29 | 1998-02-17 | Mitsubishi Denki Kabushiki Kaisha | IC card including a memory, a password collating means and an access permitting means for permitting access to the memory |
US6094724A (en) * | 1997-11-26 | 2000-07-25 | Atmel Corporation | Secure memory having anti-wire tapping |
US6085337A (en) * | 1998-09-21 | 2000-07-04 | Infineon Technologies North America Corp. | Method and system for reliably indicating test results during a self-check operation |
US6401198B1 (en) * | 1999-03-09 | 2002-06-04 | Texas Instruments Incorporated | Storing system-level mass storage configuration data in non-volatile memory on each mass storage device to allow for reboot/power-on reconfiguration of all installed mass storage devices to the same configuration as last use |
US7873837B1 (en) * | 2000-01-06 | 2011-01-18 | Super Talent Electronics, Inc. | Data security for electronic data flash card |
US7702984B1 (en) * | 2000-01-06 | 2010-04-20 | Super Talent Electronics, Inc. | High volume testing for USB electronic data flash cards |
US7788553B2 (en) * | 2000-01-06 | 2010-08-31 | Super Talent Electronics, Inc. | Mass production testing of USB flash cards with various flash memory cells |
US6681304B1 (en) * | 2000-06-30 | 2004-01-20 | Intel Corporation | Method and device for providing hidden storage in non-volatile memory |
US6892322B1 (en) * | 2000-10-26 | 2005-05-10 | Cypress Semiconductor Corporation | Method for applying instructions to microprocessor in test mode |
US6731536B1 (en) * | 2001-03-05 | 2004-05-04 | Advanced Micro Devices, Inc. | Password and dynamic protection of flash memory data |
US20030018939A1 (en) * | 2001-07-19 | 2003-01-23 | Mitsubishi Denki Kabushiki Kaisha | Test circuit capable of testing embedded memory with reliability |
US7099906B2 (en) * | 2001-10-12 | 2006-08-29 | Stmicroelectronics, S.R.L. | Random bit sequence generator |
US20030084307A1 (en) * | 2001-10-30 | 2003-05-01 | Schwartz Jeffrey D. | Secure boot device selection method and system |
US7395434B2 (en) * | 2002-05-01 | 2008-07-01 | Hewlett-Packard Development Company, L.P. | Method for secure storage and verification of the administrator, power-on password and configuration information |
US20040071028A1 (en) * | 2002-05-31 | 2004-04-15 | Stmicroelectronics S.R.L. | Testing method and device for non-volatile memories having a LPC (low pin count) communication serial interface |
US20040025027A1 (en) * | 2002-07-30 | 2004-02-05 | Eric Balard | Secure protection method for access to protected resources in a processor |
US7441169B2 (en) * | 2002-12-16 | 2008-10-21 | Renesas Technology Corp. | Semiconductor integrated circuit with test circuit |
US20050044222A1 (en) * | 2003-06-26 | 2005-02-24 | Kazuma Sekiya | Method of exchanging test processing information |
US7730368B2 (en) * | 2003-10-31 | 2010-06-01 | Sandisk Il Ltd. | Method, system and computer-readable code for testing of flash memory |
US20100043078A1 (en) * | 2004-02-23 | 2010-02-18 | Lexar Media, Inc. | Secure compact flash |
US20080147964A1 (en) * | 2004-02-26 | 2008-06-19 | Chow David Q | Using various flash memory cells to build usb data flash cards with multiple partitions and autorun function |
US20050229065A1 (en) * | 2004-04-01 | 2005-10-13 | Yasukazu Kai | Semiconductor integrated ciruit which properly executes an operational test of a circuit under test in the semiconductor integrated circuit |
US7519873B2 (en) * | 2004-06-11 | 2009-04-14 | Samsung Electronics Co., Ltd. | Methods and apparatus for interfacing between test system and memory |
US20060059398A1 (en) * | 2004-09-10 | 2006-03-16 | Chang Young-Uk | Generation of test mode signals in memory device with minimized wiring |
US20080189557A1 (en) * | 2005-01-19 | 2008-08-07 | Stmicroelectronics S.R.I. | Method and architecture for restricting access to a memory device |
US20070192828A1 (en) * | 2005-01-19 | 2007-08-16 | Stmicroelectronics S.R.L. | Enhanced security memory access method and architecture |
US8276185B2 (en) * | 2005-01-19 | 2012-09-25 | Micron Technology, Inc. | Enhanced security memory access method and architecture |
US20130014215A1 (en) * | 2005-01-19 | 2013-01-10 | Marco Messina | Security memory access method and apparatus |
US20060161725A1 (en) * | 2005-01-20 | 2006-07-20 | Lee Charles C | Multiple function flash memory system |
US20110068907A1 (en) * | 2005-04-25 | 2011-03-24 | Seung Hyup Ryoo | Reader control system |
US20060282734A1 (en) * | 2005-05-23 | 2006-12-14 | Arm Limited | Test access control for secure integrated circuits |
US20090125683A1 (en) * | 2005-11-07 | 2009-05-14 | Satoshi Okamoto | Portable auxiliary storage device |
US20090307502A1 (en) * | 2008-06-04 | 2009-12-10 | Ati Technologies Ulc | Method and apparatus for securing digital information on an integrated circuit read only memory during test operating modes |
US20090307411A1 (en) * | 2008-06-04 | 2009-12-10 | Ati Technologies Ulc | Method and apparatus for securing digital information on an integrated circuit during test operating modes |
Also Published As
Publication number | Publication date |
---|---|
US20100138915A1 (en) | 2010-06-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8776174B2 (en) | Security memory access method and apparatus | |
US8659969B2 (en) | Semiconductor device | |
US9037824B2 (en) | Password accessible microelectronic memory | |
JP2020537280A (en) | Hacking prevention mechanism for flash memory devices | |
US9378157B2 (en) | Security memory access method and apparatus | |
US20220012374A1 (en) | Semiconductor device with secure access key and associated methods and systems | |
US9653004B2 (en) | Systems and methods for downloading code and data into a secure non-volatile memory | |
US9076507B2 (en) | Nonvolatile memory and method of operating nonvolatile memory | |
US9471812B2 (en) | Method for implementing security of non-volatile memory | |
US20220155978A1 (en) | Unauthorized memory access mitigation | |
KR102500058B1 (en) | Semiconductor device with secure access key and related method and system | |
EP4055508A1 (en) | Semiconductor device with secure access key and associated methods and systems | |
EP1687827A1 (en) | Embedded memory with security row lock protection | |
US8045381B2 (en) | Device for protecting a memory against attacks by error injection | |
US8844023B2 (en) | Password protected built-in test mode for memories | |
US20160021073A1 (en) | Secure spin torque transfer magnetic random access memory (sttmram) | |
US8380918B2 (en) | Non-volatile storage alteration tracking | |
JP6281027B1 (en) | Flash memory device configurable to provide read-only memory functionality | |
KR20150101232A (en) | Method of operating storage device including nonvolatile memory and memory controller | |
US20090049543A1 (en) | Method for booting and protecting data in hard disk of computer system and module for protecting data thereof | |
US7730272B2 (en) | Non-volatile memory device and method of encrypting data in the same | |
JP2002007372A (en) | Semiconductor device | |
JP2004185670A (en) | Nonvolatile semiconductor storage device and semiconductor device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: NUMONYX B.V.,SWITZERLAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LA MALFA, ANTONINO;MESSINA, MARCO;REEL/FRAME:024601/0517 Effective date: 20081122 Owner name: NUMONYX B.V., SWITZERLAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LA MALFA, ANTONINO;MESSINA, MARCO;REEL/FRAME:024601/0517 Effective date: 20081122 |
|
AS | Assignment |
Owner name: MICRON TECHNOLOGY, INC., IDAHO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NUMONYX B.V.;REEL/FRAME:027075/0682 Effective date: 20110930 |
|
AS | Assignment |
Owner name: MICRON TECHNOLOGY, INC., IDAHO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NUMONYX B.V.;REEL/FRAME:027126/0176 Effective date: 20110930 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT, CALIFORNIA Free format text: SECURITY INTEREST;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:038669/0001 Effective date: 20160426 Owner name: U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGEN Free format text: SECURITY INTEREST;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:038669/0001 Effective date: 20160426 |
|
AS | Assignment |
Owner name: MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT, MARYLAND Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:038954/0001 Effective date: 20160426 Owner name: MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:038954/0001 Effective date: 20160426 |
|
AS | Assignment |
Owner name: U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT, CALIFORNIA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REPLACE ERRONEOUSLY FILED PATENT #7358718 WITH THE CORRECT PATENT #7358178 PREVIOUSLY RECORDED ON REEL 038669 FRAME 0001. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:043079/0001 Effective date: 20160426 Owner name: U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGEN Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REPLACE ERRONEOUSLY FILED PATENT #7358718 WITH THE CORRECT PATENT #7358178 PREVIOUSLY RECORDED ON REEL 038669 FRAME 0001. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:043079/0001 Effective date: 20160426 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551) Year of fee payment: 4 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT, ILLINOIS Free format text: SECURITY INTEREST;ASSIGNORS:MICRON TECHNOLOGY, INC.;MICRON SEMICONDUCTOR PRODUCTS, INC.;REEL/FRAME:047540/0001 Effective date: 20180703 Owner name: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT, IL Free format text: SECURITY INTEREST;ASSIGNORS:MICRON TECHNOLOGY, INC.;MICRON SEMICONDUCTOR PRODUCTS, INC.;REEL/FRAME:047540/0001 Effective date: 20180703 |
|
CC | Certificate of correction | ||
AS | Assignment |
Owner name: MICRON TECHNOLOGY, INC., IDAHO Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT;REEL/FRAME:047243/0001 Effective date: 20180629 |
|
AS | Assignment |
Owner name: MICRON TECHNOLOGY, INC., IDAHO Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT;REEL/FRAME:050937/0001 Effective date: 20190731 |
|
AS | Assignment |
Owner name: MICRON SEMICONDUCTOR PRODUCTS, INC., IDAHO Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:051028/0001 Effective date: 20190731 Owner name: MICRON TECHNOLOGY, INC., IDAHO Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:051028/0001 Effective date: 20190731 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |